Presentation is loading. Please wait.

Presentation is loading. Please wait.

Perimeter Security A Holistic Approach. Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss.

Similar presentations


Presentation on theme: "Perimeter Security A Holistic Approach. Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss."— Presentation transcript:

1 Perimeter Security A Holistic Approach

2 Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss Best Value Analysis GOALS Perimeter Security A holistic approach

3 Financial Efficiency Effective Response Why Perimeter Security? Perimeter Security A holistic approach

4 FOUR TENETS DETECTION Perimeter Security A holistic approach

5 FOUR TENETS ASSESSMENT Perimeter Security A holistic approach

6 FOUR TENETS DELAY Perimeter Security A holistic approach

7 FOUR TENETS RESPONSE Perimeter Security A holistic approach

8 FOUR TENETS RESPONSE Perimeter Security A holistic approach

9 Detection Assessment Delay Response The Holistic Approach FOUR TENETS Perimeter Security A holistic approach

10 Environmental – Five year weather history – Data Daily Temperature Daily Precipitation Snowfall Wind Ice Fog (anecdotal) SITE ANALYSIS Perimeter Security A holistic approach

11 SITE DATA December 2007 to December 2008 Perimeter Security A holistic approach

12 SITE ANALYSIS Environmental Summary (of 5 years days) Precipitation Events – 461 Events above 1” – 1 Average Precipitation Inches Greatest Precipitation – 1.41 Inches Snow Events – 101 Events above 1” – 36 Average Daily Depth – 1.08 Inches Greatest Daily Depth – 4.1 Inches Wind Events Highest Wind Event – 103 MPH 43% of wind events above 20 MPH Ice – 138 days w/precip and temps 32 and below Fog - Anecdotal Perimeter Security A holistic approach

13 SITE ISSUES –Length of Perimeter –Patrol Road at perimeter –Terrain –Perimeter Barriers –Curved fences –Single Fences in perimeter –Obstacles –Buildings in perimeter –Structures near perimeter –Sources of False Alarms –Recreation near inner perimeter –Wildlife –Condition of fence –Configuration of fence Perimeter Security A holistic approach

14 Physical - Barriers SITE ISSUES Perimeter Security A holistic approach

15 Physical - Terrain SITE ISSUES Perimeter Security A holistic approach

16 Physical - Obstacles SITE ISSUES Perimeter Security A holistic approach

17 Threats – Aggressive Attempt – Stealthy Attempt – Cut – Tunneling – Bridging – Vaulting/Stilts – Assisted Attempts Cost of Failure – Forms of Failure – Confidence Factor – Addition of manpower – Risk to the public ASSESS RISKS Perimeter Security A holistic approach

18 Buried Ported Coax (Leaky Cable) TECH Perimeter Security A holistic approach

19 Buried Ported Coax (Leaky Cable) – Concept Transmit/Receive parallel buried cables establish magnetic field. Disturbance in field is detected. Approx 3’ height field. – Pros Very adaptable to terrain High probability of detection Detects surface and tunneling threats – Cons Running and Standing Water Erosion Moderately susceptible to EMI/RFI – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

20 Electrostatic Field (E Field, X Field) TECH Perimeter Security A holistic approach

21 Electrostatic Field (E Field, X Field) – Concept Electrostatic field established between wires, disturbance of field is detected – Pros Very flexible mounting options No high tensioned cable – Cons Highly susceptible to EMI/RFI Snow builds disables Maintenance (re-tensioning) – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach

22 Bi-Static Microwave Detection TECH Perimeter Security A holistic approach

23 Bi-Static Microwave Detection – Concept Transmit and receive head establish cigar shaped microwave beam – movement that breaks or partial blocks beam is detected – Pros Visible Deterrence Covert Beam High Probability of detection – Cons Multi-stack to avoid snow builds Must have level, clear field of view Generally after fence barrier – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

24 Passive Infrared TECH Perimeter Security A holistic approach

25 Passive Infrared – Concept Heat sources in the field of view are detected and evaluated as targets – Pros Compares full view with small changes to moderate FAR/NAR from environmental sources – Cons Temperature masking Small targets at the end of field of view – Costs Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

26 Active Photo Elec, Laser, Infrared TECH Perimeter Security A holistic approach

27 Active Photo Beam, Laser, Infrared – Concept Break Beam Detectors – Pros Visible Deterrence Covert Beam Variety of mounting options – Cons Snow builds disables Alignment Issues High Maintenance – Cost Moderate First Cost High TCO TECH Perimeter Security A holistic approach

28 Ground Surveillance Radar TECH Perimeter Security A holistic approach

29 Ground Surveillance Radar (passive) – Concept Reflected back energy from activity in shaped millimeter wave radar beam is detected – Pros Precise end of field of view cut-off Curtain wall beam pattern available – Cons Freeze over blockage (rare) – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

30 Monostatic Microwave and Hybrid (Doppler MW and Passive IR) TECH Perimeter Security A holistic approach

31 Monostatic Microwave and Hybrid (Doppler MW and Passive IR) – Concept Reflected back energy from IR source or MW energy is detected – Pros Only responds if both detectors are activated (“anded” together) – Cons Very short range – Not Recommended for primary sensor Good product for portals and difficult terrain area TECH Perimeter Security A holistic approach

32 Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors TECH Perimeter Security A holistic approach

33 Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors – Magnetic Polymer Strain Sensors – Concept Vibrations on fence are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes – Pros Terrain friendly, large sensitivity adjustment – Cons Subject to NAR/FAR sources on fence – Cost Low to Moderate First Costs Potentially High TCO TECH Perimeter Security A holistic approach

34 Acoustic and Fiber sensors on/in Razor/Barbed Wire TECH Perimeter Security A holistic approach

35 Acoustic and Fiber sensors on/in Razor/Barbed Wire – Concept Vibrations on razor/barbed wire are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes – Pros Easy install, highly configurable Better shielded from UV – Cons Subject to NAR/FAR sources on fence – Cost Low to Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach

36 Fiber Mesh Sensor TECH Perimeter Security A holistic approach

37 Fiber Mesh Sensor – Concept Fiber mat covers the fence surface, cuts in the mat are detected – Pros Easy install Very low NAR/FAR – Cons Subject to UV damage Very difficult to troubleshoot and repair – Cost Low First Costs High TCO TECH Perimeter Security A holistic approach

38 Taut Wire Sensor TECH Perimeter Security A holistic approach

39 Taut Wire Sensor – Concept Array of high tension wires are attached to anchor/sensor posts. Deflection or cut of wire is detected. – Pros Very High Probability of Detection Very Low NAR/FAR Very difficult to defeat – Cons Moderate Maintenance – Cost High First Costs Low TCO TECH Perimeter Security A holistic approach

40 Video Motion Detection TECH Perimeter Security A holistic approach

41 Video Motion Detection – Concept Changes in pixels on a video image consistent with desired target is detected and tracked – Pros Combines detection and assessment – Cons High FAR/NAR from environmental issues Heavy rain, fog, snow obscures view and impedes detection – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach

42 Thermal Video Motion Detection TECH Perimeter Security A holistic approach

43 Thermal Video Motion Detection – Concept Changes in pixels on a thermal video image consistent with desired target is detected and tracked – Pros Combines detection and assessment Targets high contrast images (eliminates most environmental FAR/NAR issues) – Cons Somewhat susceptible to fog – Costs Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

44 Seismic Detectors TECH Perimeter Security A holistic approach

45 Seismic Detectors – Concept Seismic disturbances on fence or in the ground activate a “geophone” – signal is interpreted as consistent with target – Pros High Probability of Detection Flexible Deployment – Cons Subject to FAR/NAR from vehicles Reduced sensitivity in frozen ground (buried) – Costs Moderate First Costs Potentially High TCO TECH Perimeter Security A holistic approach

46 Point Sensors TECH Perimeter Security A holistic approach

47 Point Sensors – Concept Mechanical action is detected when it activates shock sensor, accelerometer, piezo or mercury switches – Pros Very low initial cost – Cons Potentially high FAR/NAR – Costs Low First Costs Moderate to High TCO (depending on technology) TECH Perimeter Security A holistic approach

48 Fluid Filled Pressure Sensors TECH Perimeter Security A holistic approach

49 Fluid Filled Pressure Sensors – Concept Two pressurized fluid filled tubes are buried parallel - micro pressure changes are detected – Pros Buried sensor detects tunneling and surface targets – Cons Reduced sensitivity in frozen ground No deterrence – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach

50 Lethal and Stun Fence TECH Perimeter Security A holistic approach

51 Lethal and Stun Fences – Concept Lethal or Stun pulses of electrical current are present on horizontal wire array. Contact between wires or to ground is lethal or disabling – Pros Very high deterrence – Cons Lethal requires additional protective fence High nuisance wildlife kills Stun fence potential liability – Cost Moderate to High First Costs (depending on product) Low to High TCO (depending on product) TECH Perimeter Security A holistic approach

52 Best Value Analysis ANALYSIS Cat WtWeightTaut WireFence SensorBuried SensorArea DetectorsVideo Sensor COST First Costs Cost of Failure (Risk) TCO POD Hi POD increase NAR Failure Potential Factor 8 FAR/NAR Environmental EMI/RFI Discriminates non-threats DETERRANCE Overt Intimidating Factor 8 INTERFERENCE EMI/RFI Weather Terrain (Soils, Water etc) VULNERABILITY Stealthy attack Aggressive attack Assisted attack Avoidance MAINTENANCE Staff perform PM Staff perform CM Cost of Maintenance RELIABILITY (MTBF) Field Components Head End Total00.0 Perimeter Security A holistic approach

53 The Holistic Approach Perimeter Security is a marriage of technology, the environment and an understanding of the human element SUMMARY Perimeter Security A holistic approach

54 ? QUESTIONS Perimeter Security A holistic approach


Download ppt "Perimeter Security A Holistic Approach. Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss."

Similar presentations


Ads by Google